From Secunia Advisory at $URL: "Jose A. Vazquez has discovered a vulnerability in Opera, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error when processing SVG content nested within a frameset and can be exploited via a specially crafted web page. Successful exploitation allows execution of arbitrary code. This may be related to: SA44611 The vulnerability is confirmed in version 11.51 Build 1087. Other versions may also be affected."
*** Bug 387141 has been marked as a duplicate of this bug. ***
*** Bug 387527 has been marked as a duplicate of this bug. ***
Arch teams, please test and mark stable: =www-client/opera-11.52.1100 Target KEYWORDS="amd64 x86"
amd64 ok
ditto Ago
amd64 done. Thanks Agostino and Ian
x86 stable
Thanks, everyone. Added to existing GLSA request.
From MITRE CVE Request: http://spa-s3c.blogspot.com/2011/10/spas3c-sv-006opera-browser-101112-0-day.html is CVE-2011-4065. The CVE-2011-4065 name has been assigned since October.
This issue was resolved and addressed in GLSA 201206-03 at http://security.gentoo.org/glsa/glsa-201206-03.xml by GLSA coordinator Sean Amoss (ackle).